Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp4481708ybx; Mon, 4 Nov 2019 14:09:22 -0800 (PST) X-Google-Smtp-Source: APXvYqz1WtE9M4V1wUG4GkAud4AAPxmIxAH/FxefvXRLkqx5EQsIL0nKQ7qAxnHQqk/2WC1YUqAI X-Received: by 2002:a05:6402:512:: with SMTP id m18mr30828814edv.250.1572905361802; Mon, 04 Nov 2019 14:09:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1572905361; cv=none; d=google.com; s=arc-20160816; b=n/JBwFrCLlqsEW1h6QFKaZKovDs1YOj/r0fH8x85uoE73sSJVchzmePR1LGbn/kyPq tSoFJakm68vqzTpD7lfKJoeCy8Co9WdUH4WDtvr5ybHHrlxuwjSDqwXxV2JToIAL+2YM 1uYkje8+S1n1y2Iuq0LDP04L2yY8igPEUr4DdDVxETxz2pL20bSUtr/ghfnvxZHuxAjy uZtMphMMKM+8fJNkKVx87N+xZ08WLzVnBwiO5Wv39zPkdFxedDOLae596U+SqNiX6bw+ vfGW0PH2HgzhQIx4h2t/SFtGRspBQx+zzLoQ9AAHrUjdKJ5H7JaFid+iMXrz7lJUvizA 3/sQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=yxaxnK1CWTHHkd/dsGtGuzGGpyijLHZ1lmj6LO3jaas=; b=Mv+EYXtd7spV4Z4TtAsusGbtmJmn6SIHBxMPlPuC5uKg+jgniAhajfuc/orK6Orol+ 4fLnGQwTZDp66kbQTiyW9Dh6PM4LbkPtIoUJmMorEXa7DWeQHupbGrPre2m1ZSrDNiC2 TH1ZuKwNhJ7YtnC0AJ07dxawowNju954YUxCAi93w6QHYNwCAGI1AP4PdSQVDRDINXqn eg+F+aAHbGUw4tvdBp4G8oOby8UlKAgTXliBDUnQp8lvOvecjlXg+P9dpbbonseNjOvM eGg3VY0OLIz9zbtkqO/LWMYgnZcGeIDUEqFnX9jN0leRcdjUFiHInD8NjbEwYIA+tHsk SB+Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="W4cf/7qJ"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f31si8146910edf.75.2019.11.04.14.08.57; Mon, 04 Nov 2019 14:09:21 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="W4cf/7qJ"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389005AbfKDWFj (ORCPT + 99 others); Mon, 4 Nov 2019 17:05:39 -0500 Received: from mail.kernel.org ([198.145.29.99]:36938 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389324AbfKDWFc (ORCPT ); Mon, 4 Nov 2019 17:05:32 -0500 Received: from localhost (6.204-14-84.ripe.coltfrance.com [84.14.204.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5A90E214D8; Mon, 4 Nov 2019 22:05:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1572905131; bh=u+PDeIpENxF2w8Mc5c9ZgN3DXHT+XJyO2627PXUD5/0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=W4cf/7qJHtcFQku8b9CTHtQWz2PwKi/hNd7fLkoTTPb5fePfTGht6/9OddHNmRZe8 ++2jvHftLqg/GJxsxEDT6C5YX1OzY8YhTM3nwQWo4m8Fq9g0+T8m+B+RYY3psoUp16 lCl0CqLAH/1Jf26130fB3QID+urewmD7occn4d1Y= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jack Morgenstein , Leon Romanovsky , Jason Gunthorpe , Sasha Levin Subject: [PATCH 5.3 038/163] RDMA/cm: Fix memory leak in cm_add/remove_one Date: Mon, 4 Nov 2019 22:43:48 +0100 Message-Id: <20191104212142.987992009@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191104212140.046021995@linuxfoundation.org> References: <20191104212140.046021995@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jack Morgenstein [ Upstream commit 94635c36f3854934a46d9e812e028d4721bbb0e6 ] In the process of moving the debug counters sysfs entries, the commit mentioned below eliminated the cm_infiniband sysfs directory. This sysfs directory was tied to the cm_port object allocated in procedure cm_add_one(). Before the commit below, this cm_port object was freed via a call to kobject_put(port->kobj) in procedure cm_remove_port_fs(). Since port no longer uses its kobj, kobject_put(port->kobj) was eliminated. This, however, meant that kfree was never called for the cm_port buffers. Fix this by adding explicit kfree(port) calls to functions cm_add_one() and cm_remove_one(). Note: the kfree call in the first chunk below (in the cm_add_one error flow) fixes an old, undetected memory leak. Fixes: c87e65cfb97c ("RDMA/cm: Move debug counters to be under relevant IB device") Link: https://lore.kernel.org/r/20190916071154.20383-2-leon@kernel.org Signed-off-by: Jack Morgenstein Signed-off-by: Leon Romanovsky Reviewed-by: Jason Gunthorpe Signed-off-by: Jason Gunthorpe Signed-off-by: Sasha Levin --- drivers/infiniband/core/cm.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/drivers/infiniband/core/cm.c b/drivers/infiniband/core/cm.c index da10e6ccb43cd..5920c0085d35b 100644 --- a/drivers/infiniband/core/cm.c +++ b/drivers/infiniband/core/cm.c @@ -4399,6 +4399,7 @@ error2: error1: port_modify.set_port_cap_mask = 0; port_modify.clr_port_cap_mask = IB_PORT_CM_SUP; + kfree(port); while (--i) { if (!rdma_cap_ib_cm(ib_device, i)) continue; @@ -4407,6 +4408,7 @@ error1: ib_modify_port(ib_device, port->port_num, 0, &port_modify); ib_unregister_mad_agent(port->mad_agent); cm_remove_port_fs(port); + kfree(port); } free: kfree(cm_dev); @@ -4460,6 +4462,7 @@ static void cm_remove_one(struct ib_device *ib_device, void *client_data) spin_unlock_irq(&cm.state_lock); ib_unregister_mad_agent(cur_mad_agent); cm_remove_port_fs(port); + kfree(port); } kfree(cm_dev); -- 2.20.1